vtls.c 39 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 1998 - 2021, Daniel Stenberg, <[email protected]>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at https://curl.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. /* This file is for implementing all "generic" SSL functions that all libcurl
  23. internals should use. It is then responsible for calling the proper
  24. "backend" function.
  25. SSL-functions in libcurl should call functions in this source file, and not
  26. to any specific SSL-layer.
  27. Curl_ssl_ - prefix for generic ones
  28. Note that this source code uses the functions of the configured SSL
  29. backend via the global Curl_ssl instance.
  30. "SSL/TLS Strong Encryption: An Introduction"
  31. https://httpd.apache.org/docs/2.0/ssl/ssl_intro.html
  32. */
  33. #include "curl_setup.h"
  34. #ifdef HAVE_SYS_TYPES_H
  35. #include <sys/types.h>
  36. #endif
  37. #ifdef HAVE_SYS_STAT_H
  38. #include <sys/stat.h>
  39. #endif
  40. #ifdef HAVE_FCNTL_H
  41. #include <fcntl.h>
  42. #endif
  43. #include "urldata.h"
  44. #include "vtls.h" /* generic SSL protos etc */
  45. #include "slist.h"
  46. #include "sendf.h"
  47. #include "strcase.h"
  48. #include "url.h"
  49. #include "progress.h"
  50. #include "share.h"
  51. #include "multiif.h"
  52. #include "timeval.h"
  53. #include "curl_md5.h"
  54. #include "warnless.h"
  55. #include "curl_base64.h"
  56. #include "curl_printf.h"
  57. #include "strdup.h"
  58. /* The last #include files should be: */
  59. #include "curl_memory.h"
  60. #include "memdebug.h"
  61. /* convenience macro to check if this handle is using a shared SSL session */
  62. #define SSLSESSION_SHARED(data) (data->share && \
  63. (data->share->specifier & \
  64. (1<<CURL_LOCK_DATA_SSL_SESSION)))
  65. #define CLONE_STRING(var) \
  66. do { \
  67. if(source->var) { \
  68. dest->var = strdup(source->var); \
  69. if(!dest->var) \
  70. return FALSE; \
  71. } \
  72. else \
  73. dest->var = NULL; \
  74. } while(0)
  75. #define CLONE_BLOB(var) \
  76. do { \
  77. if(blobdup(&dest->var, source->var)) \
  78. return FALSE; \
  79. } while(0)
  80. static CURLcode blobdup(struct curl_blob **dest,
  81. struct curl_blob *src)
  82. {
  83. DEBUGASSERT(dest);
  84. DEBUGASSERT(!*dest);
  85. if(src) {
  86. /* only if there's data to dupe! */
  87. struct curl_blob *d;
  88. d = malloc(sizeof(struct curl_blob) + src->len);
  89. if(!d)
  90. return CURLE_OUT_OF_MEMORY;
  91. d->len = src->len;
  92. /* Always duplicate because the connection may survive longer than the
  93. handle that passed in the blob. */
  94. d->flags = CURL_BLOB_COPY;
  95. d->data = (void *)((char *)d + sizeof(struct curl_blob));
  96. memcpy(d->data, src->data, src->len);
  97. *dest = d;
  98. }
  99. return CURLE_OK;
  100. }
  101. /* returns TRUE if the blobs are identical */
  102. static bool blobcmp(struct curl_blob *first, struct curl_blob *second)
  103. {
  104. if(!first && !second) /* both are NULL */
  105. return TRUE;
  106. if(!first || !second) /* one is NULL */
  107. return FALSE;
  108. if(first->len != second->len) /* different sizes */
  109. return FALSE;
  110. return !memcmp(first->data, second->data, first->len); /* same data */
  111. }
  112. static bool safecmp(char *a, char *b)
  113. {
  114. if(a && b)
  115. return !strcmp(a, b);
  116. else if(!a && !b)
  117. return TRUE; /* match */
  118. return FALSE; /* no match */
  119. }
  120. bool
  121. Curl_ssl_config_matches(struct ssl_primary_config *data,
  122. struct ssl_primary_config *needle)
  123. {
  124. if((data->version == needle->version) &&
  125. (data->version_max == needle->version_max) &&
  126. (data->verifypeer == needle->verifypeer) &&
  127. (data->verifyhost == needle->verifyhost) &&
  128. (data->verifystatus == needle->verifystatus) &&
  129. blobcmp(data->cert_blob, needle->cert_blob) &&
  130. blobcmp(data->ca_info_blob, needle->ca_info_blob) &&
  131. blobcmp(data->issuercert_blob, needle->issuercert_blob) &&
  132. safecmp(data->CApath, needle->CApath) &&
  133. safecmp(data->CAfile, needle->CAfile) &&
  134. safecmp(data->issuercert, needle->issuercert) &&
  135. safecmp(data->clientcert, needle->clientcert) &&
  136. safecmp(data->random_file, needle->random_file) &&
  137. safecmp(data->egdsocket, needle->egdsocket) &&
  138. Curl_safe_strcasecompare(data->cipher_list, needle->cipher_list) &&
  139. Curl_safe_strcasecompare(data->cipher_list13, needle->cipher_list13) &&
  140. Curl_safe_strcasecompare(data->curves, needle->curves) &&
  141. Curl_safe_strcasecompare(data->pinned_key, needle->pinned_key))
  142. return TRUE;
  143. return FALSE;
  144. }
  145. bool
  146. Curl_clone_primary_ssl_config(struct ssl_primary_config *source,
  147. struct ssl_primary_config *dest)
  148. {
  149. dest->version = source->version;
  150. dest->version_max = source->version_max;
  151. dest->verifypeer = source->verifypeer;
  152. dest->verifyhost = source->verifyhost;
  153. dest->verifystatus = source->verifystatus;
  154. dest->sessionid = source->sessionid;
  155. CLONE_BLOB(cert_blob);
  156. CLONE_BLOB(ca_info_blob);
  157. CLONE_BLOB(issuercert_blob);
  158. CLONE_STRING(CApath);
  159. CLONE_STRING(CAfile);
  160. CLONE_STRING(issuercert);
  161. CLONE_STRING(clientcert);
  162. CLONE_STRING(random_file);
  163. CLONE_STRING(egdsocket);
  164. CLONE_STRING(cipher_list);
  165. CLONE_STRING(cipher_list13);
  166. CLONE_STRING(pinned_key);
  167. CLONE_STRING(curves);
  168. return TRUE;
  169. }
  170. void Curl_free_primary_ssl_config(struct ssl_primary_config *sslc)
  171. {
  172. Curl_safefree(sslc->CApath);
  173. Curl_safefree(sslc->CAfile);
  174. Curl_safefree(sslc->issuercert);
  175. Curl_safefree(sslc->clientcert);
  176. Curl_safefree(sslc->random_file);
  177. Curl_safefree(sslc->egdsocket);
  178. Curl_safefree(sslc->cipher_list);
  179. Curl_safefree(sslc->cipher_list13);
  180. Curl_safefree(sslc->pinned_key);
  181. Curl_safefree(sslc->cert_blob);
  182. Curl_safefree(sslc->ca_info_blob);
  183. Curl_safefree(sslc->issuercert_blob);
  184. Curl_safefree(sslc->curves);
  185. }
  186. #ifdef USE_SSL
  187. static int multissl_setup(const struct Curl_ssl *backend);
  188. #endif
  189. int Curl_ssl_backend(void)
  190. {
  191. #ifdef USE_SSL
  192. multissl_setup(NULL);
  193. return Curl_ssl->info.id;
  194. #else
  195. return (int)CURLSSLBACKEND_NONE;
  196. #endif
  197. }
  198. #ifdef USE_SSL
  199. /* "global" init done? */
  200. static bool init_ssl = FALSE;
  201. /**
  202. * Global SSL init
  203. *
  204. * @retval 0 error initializing SSL
  205. * @retval 1 SSL initialized successfully
  206. */
  207. int Curl_ssl_init(void)
  208. {
  209. /* make sure this is only done once */
  210. if(init_ssl)
  211. return 1;
  212. init_ssl = TRUE; /* never again */
  213. return Curl_ssl->init();
  214. }
  215. #if defined(CURL_WITH_MULTI_SSL)
  216. static const struct Curl_ssl Curl_ssl_multi;
  217. #endif
  218. /* Global cleanup */
  219. void Curl_ssl_cleanup(void)
  220. {
  221. if(init_ssl) {
  222. /* only cleanup if we did a previous init */
  223. Curl_ssl->cleanup();
  224. #if defined(CURL_WITH_MULTI_SSL)
  225. Curl_ssl = &Curl_ssl_multi;
  226. #endif
  227. init_ssl = FALSE;
  228. }
  229. }
  230. static bool ssl_prefs_check(struct Curl_easy *data)
  231. {
  232. /* check for CURLOPT_SSLVERSION invalid parameter value */
  233. const long sslver = data->set.ssl.primary.version;
  234. if((sslver < 0) || (sslver >= CURL_SSLVERSION_LAST)) {
  235. failf(data, "Unrecognized parameter value passed via CURLOPT_SSLVERSION");
  236. return FALSE;
  237. }
  238. switch(data->set.ssl.primary.version_max) {
  239. case CURL_SSLVERSION_MAX_NONE:
  240. case CURL_SSLVERSION_MAX_DEFAULT:
  241. break;
  242. default:
  243. if((data->set.ssl.primary.version_max >> 16) < sslver) {
  244. failf(data, "CURL_SSLVERSION_MAX incompatible with CURL_SSLVERSION");
  245. return FALSE;
  246. }
  247. }
  248. return TRUE;
  249. }
  250. #ifndef CURL_DISABLE_PROXY
  251. static CURLcode
  252. ssl_connect_init_proxy(struct connectdata *conn, int sockindex)
  253. {
  254. DEBUGASSERT(conn->bits.proxy_ssl_connected[sockindex]);
  255. if(ssl_connection_complete == conn->ssl[sockindex].state &&
  256. !conn->proxy_ssl[sockindex].use) {
  257. struct ssl_backend_data *pbdata;
  258. if(!(Curl_ssl->supports & SSLSUPP_HTTPS_PROXY))
  259. return CURLE_NOT_BUILT_IN;
  260. /* The pointers to the ssl backend data, which is opaque here, are swapped
  261. rather than move the contents. */
  262. pbdata = conn->proxy_ssl[sockindex].backend;
  263. conn->proxy_ssl[sockindex] = conn->ssl[sockindex];
  264. memset(&conn->ssl[sockindex], 0, sizeof(conn->ssl[sockindex]));
  265. memset(pbdata, 0, Curl_ssl->sizeof_ssl_backend_data);
  266. conn->ssl[sockindex].backend = pbdata;
  267. }
  268. return CURLE_OK;
  269. }
  270. #endif
  271. CURLcode
  272. Curl_ssl_connect(struct Curl_easy *data, struct connectdata *conn,
  273. int sockindex)
  274. {
  275. CURLcode result;
  276. #ifndef CURL_DISABLE_PROXY
  277. if(conn->bits.proxy_ssl_connected[sockindex]) {
  278. result = ssl_connect_init_proxy(conn, sockindex);
  279. if(result)
  280. return result;
  281. }
  282. #endif
  283. if(!ssl_prefs_check(data))
  284. return CURLE_SSL_CONNECT_ERROR;
  285. /* mark this is being ssl-enabled from here on. */
  286. conn->ssl[sockindex].use = TRUE;
  287. conn->ssl[sockindex].state = ssl_connection_negotiating;
  288. result = Curl_ssl->connect_blocking(data, conn, sockindex);
  289. if(!result)
  290. Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSL is connected */
  291. else
  292. conn->ssl[sockindex].use = FALSE;
  293. return result;
  294. }
  295. CURLcode
  296. Curl_ssl_connect_nonblocking(struct Curl_easy *data, struct connectdata *conn,
  297. bool isproxy, int sockindex, bool *done)
  298. {
  299. CURLcode result;
  300. #ifndef CURL_DISABLE_PROXY
  301. if(conn->bits.proxy_ssl_connected[sockindex]) {
  302. result = ssl_connect_init_proxy(conn, sockindex);
  303. if(result)
  304. return result;
  305. }
  306. #endif
  307. if(!ssl_prefs_check(data))
  308. return CURLE_SSL_CONNECT_ERROR;
  309. /* mark this is being ssl requested from here on. */
  310. conn->ssl[sockindex].use = TRUE;
  311. result = Curl_ssl->connect_nonblocking(data, conn, sockindex, done);
  312. if(result)
  313. conn->ssl[sockindex].use = FALSE;
  314. else if(*done && !isproxy)
  315. Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSL is connected */
  316. return result;
  317. }
  318. /*
  319. * Lock shared SSL session data
  320. */
  321. void Curl_ssl_sessionid_lock(struct Curl_easy *data)
  322. {
  323. if(SSLSESSION_SHARED(data))
  324. Curl_share_lock(data, CURL_LOCK_DATA_SSL_SESSION, CURL_LOCK_ACCESS_SINGLE);
  325. }
  326. /*
  327. * Unlock shared SSL session data
  328. */
  329. void Curl_ssl_sessionid_unlock(struct Curl_easy *data)
  330. {
  331. if(SSLSESSION_SHARED(data))
  332. Curl_share_unlock(data, CURL_LOCK_DATA_SSL_SESSION);
  333. }
  334. /*
  335. * Check if there's a session ID for the given connection in the cache, and if
  336. * there's one suitable, it is provided. Returns TRUE when no entry matched.
  337. */
  338. bool Curl_ssl_getsessionid(struct Curl_easy *data,
  339. struct connectdata *conn,
  340. const bool isProxy,
  341. void **ssl_sessionid,
  342. size_t *idsize, /* set 0 if unknown */
  343. int sockindex)
  344. {
  345. struct Curl_ssl_session *check;
  346. size_t i;
  347. long *general_age;
  348. bool no_match = TRUE;
  349. #ifndef CURL_DISABLE_PROXY
  350. struct ssl_primary_config * const ssl_config = isProxy ?
  351. &conn->proxy_ssl_config :
  352. &conn->ssl_config;
  353. const char * const name = isProxy ?
  354. conn->http_proxy.host.name : conn->host.name;
  355. int port = isProxy ? (int)conn->port : conn->remote_port;
  356. #else
  357. /* no proxy support */
  358. struct ssl_primary_config * const ssl_config = &conn->ssl_config;
  359. const char * const name = conn->host.name;
  360. int port = conn->remote_port;
  361. #endif
  362. (void)sockindex;
  363. *ssl_sessionid = NULL;
  364. #ifdef CURL_DISABLE_PROXY
  365. if(isProxy)
  366. return TRUE;
  367. #endif
  368. DEBUGASSERT(SSL_SET_OPTION(primary.sessionid));
  369. if(!SSL_SET_OPTION(primary.sessionid) || !data->state.session)
  370. /* session ID re-use is disabled or the session cache has not been
  371. setup */
  372. return TRUE;
  373. /* Lock if shared */
  374. if(SSLSESSION_SHARED(data))
  375. general_age = &data->share->sessionage;
  376. else
  377. general_age = &data->state.sessionage;
  378. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++) {
  379. check = &data->state.session[i];
  380. if(!check->sessionid)
  381. /* not session ID means blank entry */
  382. continue;
  383. if(strcasecompare(name, check->name) &&
  384. ((!conn->bits.conn_to_host && !check->conn_to_host) ||
  385. (conn->bits.conn_to_host && check->conn_to_host &&
  386. strcasecompare(conn->conn_to_host.name, check->conn_to_host))) &&
  387. ((!conn->bits.conn_to_port && check->conn_to_port == -1) ||
  388. (conn->bits.conn_to_port && check->conn_to_port != -1 &&
  389. conn->conn_to_port == check->conn_to_port)) &&
  390. (port == check->remote_port) &&
  391. strcasecompare(conn->handler->scheme, check->scheme) &&
  392. Curl_ssl_config_matches(ssl_config, &check->ssl_config)) {
  393. /* yes, we have a session ID! */
  394. (*general_age)++; /* increase general age */
  395. check->age = *general_age; /* set this as used in this age */
  396. *ssl_sessionid = check->sessionid;
  397. if(idsize)
  398. *idsize = check->idsize;
  399. no_match = FALSE;
  400. break;
  401. }
  402. }
  403. DEBUGF(infof(data, "%s Session ID in cache for %s %s://%s:%d",
  404. no_match? "Didn't find": "Found",
  405. isProxy ? "proxy" : "host",
  406. conn->handler->scheme, name, port));
  407. return no_match;
  408. }
  409. /*
  410. * Kill a single session ID entry in the cache.
  411. */
  412. void Curl_ssl_kill_session(struct Curl_ssl_session *session)
  413. {
  414. if(session->sessionid) {
  415. /* defensive check */
  416. /* free the ID the SSL-layer specific way */
  417. Curl_ssl->session_free(session->sessionid);
  418. session->sessionid = NULL;
  419. session->age = 0; /* fresh */
  420. Curl_free_primary_ssl_config(&session->ssl_config);
  421. Curl_safefree(session->name);
  422. Curl_safefree(session->conn_to_host);
  423. }
  424. }
  425. /*
  426. * Delete the given session ID from the cache.
  427. */
  428. void Curl_ssl_delsessionid(struct Curl_easy *data, void *ssl_sessionid)
  429. {
  430. size_t i;
  431. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++) {
  432. struct Curl_ssl_session *check = &data->state.session[i];
  433. if(check->sessionid == ssl_sessionid) {
  434. Curl_ssl_kill_session(check);
  435. break;
  436. }
  437. }
  438. }
  439. /*
  440. * Store session id in the session cache. The ID passed on to this function
  441. * must already have been extracted and allocated the proper way for the SSL
  442. * layer. Curl_XXXX_session_free() will be called to free/kill the session ID
  443. * later on.
  444. */
  445. CURLcode Curl_ssl_addsessionid(struct Curl_easy *data,
  446. struct connectdata *conn,
  447. const bool isProxy,
  448. void *ssl_sessionid,
  449. size_t idsize,
  450. int sockindex,
  451. bool *added)
  452. {
  453. size_t i;
  454. struct Curl_ssl_session *store;
  455. long oldest_age;
  456. char *clone_host;
  457. char *clone_conn_to_host;
  458. int conn_to_port;
  459. long *general_age;
  460. #ifndef CURL_DISABLE_PROXY
  461. struct ssl_primary_config * const ssl_config = isProxy ?
  462. &conn->proxy_ssl_config :
  463. &conn->ssl_config;
  464. const char *hostname = isProxy ? conn->http_proxy.host.name :
  465. conn->host.name;
  466. #else
  467. struct ssl_primary_config * const ssl_config = &conn->ssl_config;
  468. const char *hostname = conn->host.name;
  469. #endif
  470. (void)sockindex;
  471. if(added)
  472. *added = FALSE;
  473. if(!data->state.session)
  474. return CURLE_OK;
  475. store = &data->state.session[0];
  476. oldest_age = data->state.session[0].age; /* zero if unused */
  477. DEBUGASSERT(SSL_SET_OPTION(primary.sessionid));
  478. clone_host = strdup(hostname);
  479. if(!clone_host)
  480. return CURLE_OUT_OF_MEMORY; /* bail out */
  481. if(conn->bits.conn_to_host) {
  482. clone_conn_to_host = strdup(conn->conn_to_host.name);
  483. if(!clone_conn_to_host) {
  484. free(clone_host);
  485. return CURLE_OUT_OF_MEMORY; /* bail out */
  486. }
  487. }
  488. else
  489. clone_conn_to_host = NULL;
  490. if(conn->bits.conn_to_port)
  491. conn_to_port = conn->conn_to_port;
  492. else
  493. conn_to_port = -1;
  494. /* Now we should add the session ID and the host name to the cache, (remove
  495. the oldest if necessary) */
  496. /* If using shared SSL session, lock! */
  497. if(SSLSESSION_SHARED(data)) {
  498. general_age = &data->share->sessionage;
  499. }
  500. else {
  501. general_age = &data->state.sessionage;
  502. }
  503. /* find an empty slot for us, or find the oldest */
  504. for(i = 1; (i < data->set.general_ssl.max_ssl_sessions) &&
  505. data->state.session[i].sessionid; i++) {
  506. if(data->state.session[i].age < oldest_age) {
  507. oldest_age = data->state.session[i].age;
  508. store = &data->state.session[i];
  509. }
  510. }
  511. if(i == data->set.general_ssl.max_ssl_sessions)
  512. /* cache is full, we must "kill" the oldest entry! */
  513. Curl_ssl_kill_session(store);
  514. else
  515. store = &data->state.session[i]; /* use this slot */
  516. /* now init the session struct wisely */
  517. store->sessionid = ssl_sessionid;
  518. store->idsize = idsize;
  519. store->age = *general_age; /* set current age */
  520. /* free it if there's one already present */
  521. free(store->name);
  522. free(store->conn_to_host);
  523. store->name = clone_host; /* clone host name */
  524. store->conn_to_host = clone_conn_to_host; /* clone connect to host name */
  525. store->conn_to_port = conn_to_port; /* connect to port number */
  526. /* port number */
  527. store->remote_port = isProxy ? (int)conn->port : conn->remote_port;
  528. store->scheme = conn->handler->scheme;
  529. if(!Curl_clone_primary_ssl_config(ssl_config, &store->ssl_config)) {
  530. Curl_free_primary_ssl_config(&store->ssl_config);
  531. store->sessionid = NULL; /* let caller free sessionid */
  532. free(clone_host);
  533. free(clone_conn_to_host);
  534. return CURLE_OUT_OF_MEMORY;
  535. }
  536. if(added)
  537. *added = TRUE;
  538. DEBUGF(infof(data, "Added Session ID to cache for %s://%s:%d [%s]",
  539. store->scheme, store->name, store->remote_port,
  540. isProxy ? "PROXY" : "server"));
  541. return CURLE_OK;
  542. }
  543. void Curl_ssl_associate_conn(struct Curl_easy *data,
  544. struct connectdata *conn)
  545. {
  546. if(Curl_ssl->associate_connection) {
  547. Curl_ssl->associate_connection(data, conn, FIRSTSOCKET);
  548. if(conn->sock[SECONDARYSOCKET] && conn->bits.sock_accepted)
  549. Curl_ssl->associate_connection(data, conn, SECONDARYSOCKET);
  550. }
  551. }
  552. void Curl_ssl_detach_conn(struct Curl_easy *data,
  553. struct connectdata *conn)
  554. {
  555. if(Curl_ssl->disassociate_connection) {
  556. Curl_ssl->disassociate_connection(data, FIRSTSOCKET);
  557. if(conn->sock[SECONDARYSOCKET] && conn->bits.sock_accepted)
  558. Curl_ssl->disassociate_connection(data, SECONDARYSOCKET);
  559. }
  560. }
  561. void Curl_ssl_close_all(struct Curl_easy *data)
  562. {
  563. /* kill the session ID cache if not shared */
  564. if(data->state.session && !SSLSESSION_SHARED(data)) {
  565. size_t i;
  566. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++)
  567. /* the single-killer function handles empty table slots */
  568. Curl_ssl_kill_session(&data->state.session[i]);
  569. /* free the cache data */
  570. Curl_safefree(data->state.session);
  571. }
  572. Curl_ssl->close_all(data);
  573. }
  574. int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks)
  575. {
  576. struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET];
  577. if(connssl->connecting_state == ssl_connect_2_writing) {
  578. /* write mode */
  579. socks[0] = conn->sock[FIRSTSOCKET];
  580. return GETSOCK_WRITESOCK(0);
  581. }
  582. if(connssl->connecting_state == ssl_connect_2_reading) {
  583. /* read mode */
  584. socks[0] = conn->sock[FIRSTSOCKET];
  585. return GETSOCK_READSOCK(0);
  586. }
  587. return GETSOCK_BLANK;
  588. }
  589. void Curl_ssl_close(struct Curl_easy *data, struct connectdata *conn,
  590. int sockindex)
  591. {
  592. DEBUGASSERT((sockindex <= 1) && (sockindex >= -1));
  593. Curl_ssl->close_one(data, conn, sockindex);
  594. conn->ssl[sockindex].state = ssl_connection_none;
  595. }
  596. CURLcode Curl_ssl_shutdown(struct Curl_easy *data, struct connectdata *conn,
  597. int sockindex)
  598. {
  599. if(Curl_ssl->shut_down(data, conn, sockindex))
  600. return CURLE_SSL_SHUTDOWN_FAILED;
  601. conn->ssl[sockindex].use = FALSE; /* get back to ordinary socket usage */
  602. conn->ssl[sockindex].state = ssl_connection_none;
  603. conn->recv[sockindex] = Curl_recv_plain;
  604. conn->send[sockindex] = Curl_send_plain;
  605. return CURLE_OK;
  606. }
  607. /* Selects an SSL crypto engine
  608. */
  609. CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine)
  610. {
  611. return Curl_ssl->set_engine(data, engine);
  612. }
  613. /* Selects the default SSL crypto engine
  614. */
  615. CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data)
  616. {
  617. return Curl_ssl->set_engine_default(data);
  618. }
  619. /* Return list of OpenSSL crypto engine names. */
  620. struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data)
  621. {
  622. return Curl_ssl->engines_list(data);
  623. }
  624. /*
  625. * This sets up a session ID cache to the specified size. Make sure this code
  626. * is agnostic to what underlying SSL technology we use.
  627. */
  628. CURLcode Curl_ssl_initsessions(struct Curl_easy *data, size_t amount)
  629. {
  630. struct Curl_ssl_session *session;
  631. if(data->state.session)
  632. /* this is just a precaution to prevent multiple inits */
  633. return CURLE_OK;
  634. session = calloc(amount, sizeof(struct Curl_ssl_session));
  635. if(!session)
  636. return CURLE_OUT_OF_MEMORY;
  637. /* store the info in the SSL section */
  638. data->set.general_ssl.max_ssl_sessions = amount;
  639. data->state.session = session;
  640. data->state.sessionage = 1; /* this is brand new */
  641. return CURLE_OK;
  642. }
  643. static size_t multissl_version(char *buffer, size_t size);
  644. void Curl_ssl_version(char *buffer, size_t size)
  645. {
  646. #ifdef CURL_WITH_MULTI_SSL
  647. (void)multissl_version(buffer, size);
  648. #else
  649. (void)Curl_ssl->version(buffer, size);
  650. #endif
  651. }
  652. /*
  653. * This function tries to determine connection status.
  654. *
  655. * Return codes:
  656. * 1 means the connection is still in place
  657. * 0 means the connection has been closed
  658. * -1 means the connection status is unknown
  659. */
  660. int Curl_ssl_check_cxn(struct connectdata *conn)
  661. {
  662. return Curl_ssl->check_cxn(conn);
  663. }
  664. bool Curl_ssl_data_pending(const struct connectdata *conn,
  665. int connindex)
  666. {
  667. return Curl_ssl->data_pending(conn, connindex);
  668. }
  669. void Curl_ssl_free_certinfo(struct Curl_easy *data)
  670. {
  671. struct curl_certinfo *ci = &data->info.certs;
  672. if(ci->num_of_certs) {
  673. /* free all individual lists used */
  674. int i;
  675. for(i = 0; i<ci->num_of_certs; i++) {
  676. curl_slist_free_all(ci->certinfo[i]);
  677. ci->certinfo[i] = NULL;
  678. }
  679. free(ci->certinfo); /* free the actual array too */
  680. ci->certinfo = NULL;
  681. ci->num_of_certs = 0;
  682. }
  683. }
  684. CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num)
  685. {
  686. struct curl_certinfo *ci = &data->info.certs;
  687. struct curl_slist **table;
  688. /* Free any previous certificate information structures */
  689. Curl_ssl_free_certinfo(data);
  690. /* Allocate the required certificate information structures */
  691. table = calloc((size_t) num, sizeof(struct curl_slist *));
  692. if(!table)
  693. return CURLE_OUT_OF_MEMORY;
  694. ci->num_of_certs = num;
  695. ci->certinfo = table;
  696. return CURLE_OK;
  697. }
  698. /*
  699. * 'value' is NOT a null-terminated string
  700. */
  701. CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data,
  702. int certnum,
  703. const char *label,
  704. const char *value,
  705. size_t valuelen)
  706. {
  707. struct curl_certinfo *ci = &data->info.certs;
  708. char *output;
  709. struct curl_slist *nl;
  710. CURLcode result = CURLE_OK;
  711. size_t labellen = strlen(label);
  712. size_t outlen = labellen + 1 + valuelen + 1; /* label:value\0 */
  713. output = malloc(outlen);
  714. if(!output)
  715. return CURLE_OUT_OF_MEMORY;
  716. /* sprintf the label and colon */
  717. msnprintf(output, outlen, "%s:", label);
  718. /* memcpy the value (it might not be null-terminated) */
  719. memcpy(&output[labellen + 1], value, valuelen);
  720. /* null-terminate the output */
  721. output[labellen + 1 + valuelen] = 0;
  722. nl = Curl_slist_append_nodup(ci->certinfo[certnum], output);
  723. if(!nl) {
  724. free(output);
  725. curl_slist_free_all(ci->certinfo[certnum]);
  726. result = CURLE_OUT_OF_MEMORY;
  727. }
  728. ci->certinfo[certnum] = nl;
  729. return result;
  730. }
  731. /*
  732. * This is a convenience function for push_certinfo_len that takes a zero
  733. * terminated value.
  734. */
  735. CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data,
  736. int certnum,
  737. const char *label,
  738. const char *value)
  739. {
  740. size_t valuelen = strlen(value);
  741. return Curl_ssl_push_certinfo_len(data, certnum, label, value, valuelen);
  742. }
  743. CURLcode Curl_ssl_random(struct Curl_easy *data,
  744. unsigned char *entropy,
  745. size_t length)
  746. {
  747. return Curl_ssl->random(data, entropy, length);
  748. }
  749. /*
  750. * Public key pem to der conversion
  751. */
  752. static CURLcode pubkey_pem_to_der(const char *pem,
  753. unsigned char **der, size_t *der_len)
  754. {
  755. char *stripped_pem, *begin_pos, *end_pos;
  756. size_t pem_count, stripped_pem_count = 0, pem_len;
  757. CURLcode result;
  758. /* if no pem, exit. */
  759. if(!pem)
  760. return CURLE_BAD_CONTENT_ENCODING;
  761. begin_pos = strstr(pem, "-----BEGIN PUBLIC KEY-----");
  762. if(!begin_pos)
  763. return CURLE_BAD_CONTENT_ENCODING;
  764. pem_count = begin_pos - pem;
  765. /* Invalid if not at beginning AND not directly following \n */
  766. if(0 != pem_count && '\n' != pem[pem_count - 1])
  767. return CURLE_BAD_CONTENT_ENCODING;
  768. /* 26 is length of "-----BEGIN PUBLIC KEY-----" */
  769. pem_count += 26;
  770. /* Invalid if not directly following \n */
  771. end_pos = strstr(pem + pem_count, "\n-----END PUBLIC KEY-----");
  772. if(!end_pos)
  773. return CURLE_BAD_CONTENT_ENCODING;
  774. pem_len = end_pos - pem;
  775. stripped_pem = malloc(pem_len - pem_count + 1);
  776. if(!stripped_pem)
  777. return CURLE_OUT_OF_MEMORY;
  778. /*
  779. * Here we loop through the pem array one character at a time between the
  780. * correct indices, and place each character that is not '\n' or '\r'
  781. * into the stripped_pem array, which should represent the raw base64 string
  782. */
  783. while(pem_count < pem_len) {
  784. if('\n' != pem[pem_count] && '\r' != pem[pem_count])
  785. stripped_pem[stripped_pem_count++] = pem[pem_count];
  786. ++pem_count;
  787. }
  788. /* Place the null terminator in the correct place */
  789. stripped_pem[stripped_pem_count] = '\0';
  790. result = Curl_base64_decode(stripped_pem, der, der_len);
  791. Curl_safefree(stripped_pem);
  792. return result;
  793. }
  794. /*
  795. * Generic pinned public key check.
  796. */
  797. CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
  798. const char *pinnedpubkey,
  799. const unsigned char *pubkey, size_t pubkeylen)
  800. {
  801. FILE *fp;
  802. unsigned char *buf = NULL, *pem_ptr = NULL;
  803. CURLcode result = CURLE_SSL_PINNEDPUBKEYNOTMATCH;
  804. /* if a path wasn't specified, don't pin */
  805. if(!pinnedpubkey)
  806. return CURLE_OK;
  807. if(!pubkey || !pubkeylen)
  808. return result;
  809. /* only do this if pinnedpubkey starts with "sha256//", length 8 */
  810. if(strncmp(pinnedpubkey, "sha256//", 8) == 0) {
  811. CURLcode encode;
  812. size_t encodedlen, pinkeylen;
  813. char *encoded, *pinkeycopy, *begin_pos, *end_pos;
  814. unsigned char *sha256sumdigest;
  815. if(!Curl_ssl->sha256sum) {
  816. /* without sha256 support, this cannot match */
  817. return result;
  818. }
  819. /* compute sha256sum of public key */
  820. sha256sumdigest = malloc(CURL_SHA256_DIGEST_LENGTH);
  821. if(!sha256sumdigest)
  822. return CURLE_OUT_OF_MEMORY;
  823. encode = Curl_ssl->sha256sum(pubkey, pubkeylen,
  824. sha256sumdigest, CURL_SHA256_DIGEST_LENGTH);
  825. if(encode != CURLE_OK)
  826. return encode;
  827. encode = Curl_base64_encode(data, (char *)sha256sumdigest,
  828. CURL_SHA256_DIGEST_LENGTH, &encoded,
  829. &encodedlen);
  830. Curl_safefree(sha256sumdigest);
  831. if(encode)
  832. return encode;
  833. infof(data, " public key hash: sha256//%s", encoded);
  834. /* it starts with sha256//, copy so we can modify it */
  835. pinkeylen = strlen(pinnedpubkey) + 1;
  836. pinkeycopy = malloc(pinkeylen);
  837. if(!pinkeycopy) {
  838. Curl_safefree(encoded);
  839. return CURLE_OUT_OF_MEMORY;
  840. }
  841. memcpy(pinkeycopy, pinnedpubkey, pinkeylen);
  842. /* point begin_pos to the copy, and start extracting keys */
  843. begin_pos = pinkeycopy;
  844. do {
  845. end_pos = strstr(begin_pos, ";sha256//");
  846. /*
  847. * if there is an end_pos, null terminate,
  848. * otherwise it'll go to the end of the original string
  849. */
  850. if(end_pos)
  851. end_pos[0] = '\0';
  852. /* compare base64 sha256 digests, 8 is the length of "sha256//" */
  853. if(encodedlen == strlen(begin_pos + 8) &&
  854. !memcmp(encoded, begin_pos + 8, encodedlen)) {
  855. result = CURLE_OK;
  856. break;
  857. }
  858. /*
  859. * change back the null-terminator we changed earlier,
  860. * and look for next begin
  861. */
  862. if(end_pos) {
  863. end_pos[0] = ';';
  864. begin_pos = strstr(end_pos, "sha256//");
  865. }
  866. } while(end_pos && begin_pos);
  867. Curl_safefree(encoded);
  868. Curl_safefree(pinkeycopy);
  869. return result;
  870. }
  871. fp = fopen(pinnedpubkey, "rb");
  872. if(!fp)
  873. return result;
  874. do {
  875. long filesize;
  876. size_t size, pem_len;
  877. CURLcode pem_read;
  878. /* Determine the file's size */
  879. if(fseek(fp, 0, SEEK_END))
  880. break;
  881. filesize = ftell(fp);
  882. if(fseek(fp, 0, SEEK_SET))
  883. break;
  884. if(filesize < 0 || filesize > MAX_PINNED_PUBKEY_SIZE)
  885. break;
  886. /*
  887. * if the size of our certificate is bigger than the file
  888. * size then it can't match
  889. */
  890. size = curlx_sotouz((curl_off_t) filesize);
  891. if(pubkeylen > size)
  892. break;
  893. /*
  894. * Allocate buffer for the pinned key
  895. * With 1 additional byte for null terminator in case of PEM key
  896. */
  897. buf = malloc(size + 1);
  898. if(!buf)
  899. break;
  900. /* Returns number of elements read, which should be 1 */
  901. if((int) fread(buf, size, 1, fp) != 1)
  902. break;
  903. /* If the sizes are the same, it can't be base64 encoded, must be der */
  904. if(pubkeylen == size) {
  905. if(!memcmp(pubkey, buf, pubkeylen))
  906. result = CURLE_OK;
  907. break;
  908. }
  909. /*
  910. * Otherwise we will assume it's PEM and try to decode it
  911. * after placing null terminator
  912. */
  913. buf[size] = '\0';
  914. pem_read = pubkey_pem_to_der((const char *)buf, &pem_ptr, &pem_len);
  915. /* if it wasn't read successfully, exit */
  916. if(pem_read)
  917. break;
  918. /*
  919. * if the size of our certificate doesn't match the size of
  920. * the decoded file, they can't be the same, otherwise compare
  921. */
  922. if(pubkeylen == pem_len && !memcmp(pubkey, pem_ptr, pubkeylen))
  923. result = CURLE_OK;
  924. } while(0);
  925. Curl_safefree(buf);
  926. Curl_safefree(pem_ptr);
  927. fclose(fp);
  928. return result;
  929. }
  930. /*
  931. * Check whether the SSL backend supports the status_request extension.
  932. */
  933. bool Curl_ssl_cert_status_request(void)
  934. {
  935. return Curl_ssl->cert_status_request();
  936. }
  937. /*
  938. * Check whether the SSL backend supports false start.
  939. */
  940. bool Curl_ssl_false_start(void)
  941. {
  942. return Curl_ssl->false_start();
  943. }
  944. /*
  945. * Check whether the SSL backend supports setting TLS 1.3 cipher suites
  946. */
  947. bool Curl_ssl_tls13_ciphersuites(void)
  948. {
  949. return Curl_ssl->supports & SSLSUPP_TLS13_CIPHERSUITES;
  950. }
  951. /*
  952. * Default implementations for unsupported functions.
  953. */
  954. int Curl_none_init(void)
  955. {
  956. return 1;
  957. }
  958. void Curl_none_cleanup(void)
  959. { }
  960. int Curl_none_shutdown(struct Curl_easy *data UNUSED_PARAM,
  961. struct connectdata *conn UNUSED_PARAM,
  962. int sockindex UNUSED_PARAM)
  963. {
  964. (void)data;
  965. (void)conn;
  966. (void)sockindex;
  967. return 0;
  968. }
  969. int Curl_none_check_cxn(struct connectdata *conn UNUSED_PARAM)
  970. {
  971. (void)conn;
  972. return -1;
  973. }
  974. CURLcode Curl_none_random(struct Curl_easy *data UNUSED_PARAM,
  975. unsigned char *entropy UNUSED_PARAM,
  976. size_t length UNUSED_PARAM)
  977. {
  978. (void)data;
  979. (void)entropy;
  980. (void)length;
  981. return CURLE_NOT_BUILT_IN;
  982. }
  983. void Curl_none_close_all(struct Curl_easy *data UNUSED_PARAM)
  984. {
  985. (void)data;
  986. }
  987. void Curl_none_session_free(void *ptr UNUSED_PARAM)
  988. {
  989. (void)ptr;
  990. }
  991. bool Curl_none_data_pending(const struct connectdata *conn UNUSED_PARAM,
  992. int connindex UNUSED_PARAM)
  993. {
  994. (void)conn;
  995. (void)connindex;
  996. return 0;
  997. }
  998. bool Curl_none_cert_status_request(void)
  999. {
  1000. return FALSE;
  1001. }
  1002. CURLcode Curl_none_set_engine(struct Curl_easy *data UNUSED_PARAM,
  1003. const char *engine UNUSED_PARAM)
  1004. {
  1005. (void)data;
  1006. (void)engine;
  1007. return CURLE_NOT_BUILT_IN;
  1008. }
  1009. CURLcode Curl_none_set_engine_default(struct Curl_easy *data UNUSED_PARAM)
  1010. {
  1011. (void)data;
  1012. return CURLE_NOT_BUILT_IN;
  1013. }
  1014. struct curl_slist *Curl_none_engines_list(struct Curl_easy *data UNUSED_PARAM)
  1015. {
  1016. (void)data;
  1017. return (struct curl_slist *)NULL;
  1018. }
  1019. bool Curl_none_false_start(void)
  1020. {
  1021. return FALSE;
  1022. }
  1023. static int multissl_init(void)
  1024. {
  1025. if(multissl_setup(NULL))
  1026. return 1;
  1027. return Curl_ssl->init();
  1028. }
  1029. static CURLcode multissl_connect(struct Curl_easy *data,
  1030. struct connectdata *conn, int sockindex)
  1031. {
  1032. if(multissl_setup(NULL))
  1033. return CURLE_FAILED_INIT;
  1034. return Curl_ssl->connect_blocking(data, conn, sockindex);
  1035. }
  1036. static CURLcode multissl_connect_nonblocking(struct Curl_easy *data,
  1037. struct connectdata *conn,
  1038. int sockindex, bool *done)
  1039. {
  1040. if(multissl_setup(NULL))
  1041. return CURLE_FAILED_INIT;
  1042. return Curl_ssl->connect_nonblocking(data, conn, sockindex, done);
  1043. }
  1044. static int multissl_getsock(struct connectdata *conn, curl_socket_t *socks)
  1045. {
  1046. if(multissl_setup(NULL))
  1047. return 0;
  1048. return Curl_ssl->getsock(conn, socks);
  1049. }
  1050. static void *multissl_get_internals(struct ssl_connect_data *connssl,
  1051. CURLINFO info)
  1052. {
  1053. if(multissl_setup(NULL))
  1054. return NULL;
  1055. return Curl_ssl->get_internals(connssl, info);
  1056. }
  1057. static void multissl_close(struct Curl_easy *data, struct connectdata *conn,
  1058. int sockindex)
  1059. {
  1060. if(multissl_setup(NULL))
  1061. return;
  1062. Curl_ssl->close_one(data, conn, sockindex);
  1063. }
  1064. static const struct Curl_ssl Curl_ssl_multi = {
  1065. { CURLSSLBACKEND_NONE, "multi" }, /* info */
  1066. 0, /* supports nothing */
  1067. (size_t)-1, /* something insanely large to be on the safe side */
  1068. multissl_init, /* init */
  1069. Curl_none_cleanup, /* cleanup */
  1070. multissl_version, /* version */
  1071. Curl_none_check_cxn, /* check_cxn */
  1072. Curl_none_shutdown, /* shutdown */
  1073. Curl_none_data_pending, /* data_pending */
  1074. Curl_none_random, /* random */
  1075. Curl_none_cert_status_request, /* cert_status_request */
  1076. multissl_connect, /* connect */
  1077. multissl_connect_nonblocking, /* connect_nonblocking */
  1078. multissl_getsock, /* getsock */
  1079. multissl_get_internals, /* get_internals */
  1080. multissl_close, /* close_one */
  1081. Curl_none_close_all, /* close_all */
  1082. Curl_none_session_free, /* session_free */
  1083. Curl_none_set_engine, /* set_engine */
  1084. Curl_none_set_engine_default, /* set_engine_default */
  1085. Curl_none_engines_list, /* engines_list */
  1086. Curl_none_false_start, /* false_start */
  1087. NULL, /* sha256sum */
  1088. NULL, /* associate_connection */
  1089. NULL /* disassociate_connection */
  1090. };
  1091. const struct Curl_ssl *Curl_ssl =
  1092. #if defined(CURL_WITH_MULTI_SSL)
  1093. &Curl_ssl_multi;
  1094. #elif defined(USE_WOLFSSL)
  1095. &Curl_ssl_wolfssl;
  1096. #elif defined(USE_SECTRANSP)
  1097. &Curl_ssl_sectransp;
  1098. #elif defined(USE_GNUTLS)
  1099. &Curl_ssl_gnutls;
  1100. #elif defined(USE_GSKIT)
  1101. &Curl_ssl_gskit;
  1102. #elif defined(USE_MBEDTLS)
  1103. &Curl_ssl_mbedtls;
  1104. #elif defined(USE_NSS)
  1105. &Curl_ssl_nss;
  1106. #elif defined(USE_RUSTLS)
  1107. &Curl_ssl_rustls;
  1108. #elif defined(USE_OPENSSL)
  1109. &Curl_ssl_openssl;
  1110. #elif defined(USE_SCHANNEL)
  1111. &Curl_ssl_schannel;
  1112. #elif defined(USE_MESALINK)
  1113. &Curl_ssl_mesalink;
  1114. #elif defined(USE_BEARSSL)
  1115. &Curl_ssl_bearssl;
  1116. #else
  1117. #error "Missing struct Curl_ssl for selected SSL backend"
  1118. #endif
  1119. static const struct Curl_ssl *available_backends[] = {
  1120. #if defined(USE_WOLFSSL)
  1121. &Curl_ssl_wolfssl,
  1122. #endif
  1123. #if defined(USE_SECTRANSP)
  1124. &Curl_ssl_sectransp,
  1125. #endif
  1126. #if defined(USE_GNUTLS)
  1127. &Curl_ssl_gnutls,
  1128. #endif
  1129. #if defined(USE_GSKIT)
  1130. &Curl_ssl_gskit,
  1131. #endif
  1132. #if defined(USE_MBEDTLS)
  1133. &Curl_ssl_mbedtls,
  1134. #endif
  1135. #if defined(USE_NSS)
  1136. &Curl_ssl_nss,
  1137. #endif
  1138. #if defined(USE_OPENSSL)
  1139. &Curl_ssl_openssl,
  1140. #endif
  1141. #if defined(USE_SCHANNEL)
  1142. &Curl_ssl_schannel,
  1143. #endif
  1144. #if defined(USE_MESALINK)
  1145. &Curl_ssl_mesalink,
  1146. #endif
  1147. #if defined(USE_BEARSSL)
  1148. &Curl_ssl_bearssl,
  1149. #endif
  1150. #if defined(USE_RUSTLS)
  1151. &Curl_ssl_rustls,
  1152. #endif
  1153. NULL
  1154. };
  1155. static size_t multissl_version(char *buffer, size_t size)
  1156. {
  1157. static const struct Curl_ssl *selected;
  1158. static char backends[200];
  1159. static size_t backends_len;
  1160. const struct Curl_ssl *current;
  1161. current = Curl_ssl == &Curl_ssl_multi ? available_backends[0] : Curl_ssl;
  1162. if(current != selected) {
  1163. char *p = backends;
  1164. char *end = backends + sizeof(backends);
  1165. int i;
  1166. selected = current;
  1167. backends[0] = '\0';
  1168. for(i = 0; available_backends[i]; ++i) {
  1169. char vb[200];
  1170. bool paren = (selected != available_backends[i]);
  1171. if(available_backends[i]->version(vb, sizeof(vb))) {
  1172. p += msnprintf(p, end - p, "%s%s%s%s", (p != backends ? " " : ""),
  1173. (paren ? "(" : ""), vb, (paren ? ")" : ""));
  1174. }
  1175. }
  1176. backends_len = p - backends;
  1177. }
  1178. if(!size)
  1179. return 0;
  1180. if(size <= backends_len) {
  1181. strncpy(buffer, backends, size - 1);
  1182. buffer[size - 1] = '\0';
  1183. return size - 1;
  1184. }
  1185. strcpy(buffer, backends);
  1186. return backends_len;
  1187. }
  1188. static int multissl_setup(const struct Curl_ssl *backend)
  1189. {
  1190. const char *env;
  1191. char *env_tmp;
  1192. if(Curl_ssl != &Curl_ssl_multi)
  1193. return 1;
  1194. if(backend) {
  1195. Curl_ssl = backend;
  1196. return 0;
  1197. }
  1198. if(!available_backends[0])
  1199. return 1;
  1200. env = env_tmp = curl_getenv("CURL_SSL_BACKEND");
  1201. #ifdef CURL_DEFAULT_SSL_BACKEND
  1202. if(!env)
  1203. env = CURL_DEFAULT_SSL_BACKEND;
  1204. #endif
  1205. if(env) {
  1206. int i;
  1207. for(i = 0; available_backends[i]; i++) {
  1208. if(strcasecompare(env, available_backends[i]->info.name)) {
  1209. Curl_ssl = available_backends[i];
  1210. free(env_tmp);
  1211. return 0;
  1212. }
  1213. }
  1214. }
  1215. /* Fall back to first available backend */
  1216. Curl_ssl = available_backends[0];
  1217. free(env_tmp);
  1218. return 0;
  1219. }
  1220. CURLsslset curl_global_sslset(curl_sslbackend id, const char *name,
  1221. const curl_ssl_backend ***avail)
  1222. {
  1223. int i;
  1224. if(avail)
  1225. *avail = (const curl_ssl_backend **)&available_backends;
  1226. if(Curl_ssl != &Curl_ssl_multi)
  1227. return id == Curl_ssl->info.id ||
  1228. (name && strcasecompare(name, Curl_ssl->info.name)) ?
  1229. CURLSSLSET_OK :
  1230. #if defined(CURL_WITH_MULTI_SSL)
  1231. CURLSSLSET_TOO_LATE;
  1232. #else
  1233. CURLSSLSET_UNKNOWN_BACKEND;
  1234. #endif
  1235. for(i = 0; available_backends[i]; i++) {
  1236. if(available_backends[i]->info.id == id ||
  1237. (name && strcasecompare(available_backends[i]->info.name, name))) {
  1238. multissl_setup(available_backends[i]);
  1239. return CURLSSLSET_OK;
  1240. }
  1241. }
  1242. return CURLSSLSET_UNKNOWN_BACKEND;
  1243. }
  1244. #else /* USE_SSL */
  1245. CURLsslset curl_global_sslset(curl_sslbackend id, const char *name,
  1246. const curl_ssl_backend ***avail)
  1247. {
  1248. (void)id;
  1249. (void)name;
  1250. (void)avail;
  1251. return CURLSSLSET_NO_BACKENDS;
  1252. }
  1253. #endif /* !USE_SSL */